Static task
static1
Behavioral task
behavioral1
Sample
b8f0cbc80fbda5a48091d2f0abecee3e93913ee663ce8ad58bc04c9a7aff7c0a.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
b8f0cbc80fbda5a48091d2f0abecee3e93913ee663ce8ad58bc04c9a7aff7c0a.exe
Resource
win10v2004-20230703-en
General
-
Target
b8f0cbc80fbda5a48091d2f0abecee3e93913ee663ce8ad58bc04c9a7aff7c0a
-
Size
186KB
-
MD5
3665561baee46d9544a6604cd1edb9b5
-
SHA1
a23027b01fadd1661e6583ea774a0fe576fa8ac9
-
SHA256
b8f0cbc80fbda5a48091d2f0abecee3e93913ee663ce8ad58bc04c9a7aff7c0a
-
SHA512
3661bf7e7737bcc9dab17fccf9f83a3180bd864e9d08a6d067c2a6c6812338ec3ab26627e8fbbf8d64df1fb132ce01b4d86f8ebc0f3464c33d410176f7ebe27c
-
SSDEEP
3072:PhhtEMRSLxU4U+gYbq9gs1PqTBfC514+SiRqeZIiRbU:1ERNURUCt1iTBq5mS04
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b8f0cbc80fbda5a48091d2f0abecee3e93913ee663ce8ad58bc04c9a7aff7c0a
Files
-
b8f0cbc80fbda5a48091d2f0abecee3e93913ee663ce8ad58bc04c9a7aff7c0a.exe windows x86
69ba07b669aa23121e0462699e13c235
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TerminateProcess
Sleep
GetTempFileNameA
DeleteFileA
CreateThread
HeapDestroy
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
GetProcessHeap
FreeLibrary
GetProcAddress
GetModuleHandleW
GetLastError
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
InterlockedDecrement
InterlockedIncrement
GetCurrentProcess
ExitProcess
DecodePointer
FlushInstructionCache
SetLastError
CreateFileW
ReadFile
WideCharToMultiByte
Process32NextW
FlushFileBuffers
WriteConsoleW
SetStdHandle
LCMapStringW
GetStringTypeW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
ReadConsoleW
Process32FirstW
CreateToolhelp32Snapshot
OpenProcess
lstrcatW
lstrcpyW
lstrlenW
QueryDosDeviceW
lstrcmpiW
GetLogicalDriveStringsW
CloseHandle
RaiseException
WriteFile
CreateFileA
GetCurrentThreadId
EnterCriticalSection
SetFilePointerEx
GetStdHandle
GetConsoleMode
GetConsoleCP
CreateDirectoryW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
LeaveCriticalSection
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlUnwind
GetCommandLineW
GetSystemTimeAsFileTime
AreFileApisANSI
GetModuleHandleExW
EncodePointer
IsDebuggerPresent
OutputDebugStringW
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
IsProcessorFeaturePresent
VirtualAlloc
VirtualFree
SetEndOfFile
user32
MessageBoxA
GetWindowTextLengthW
EndDialog
IsDialogMessageW
PostQuitMessage
CharNextW
DefWindowProcW
ShowWindow
DispatchMessageW
TranslateMessage
GetDlgItem
SendMessageW
GetMessageW
SetWindowTextW
EnableWindow
SetWindowLongW
CreateDialogParamW
UnregisterClassW
DestroyWindow
PeekMessageW
advapi32
RegCloseKey
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
shell32
CommandLineToArgvW
ShellExecuteA
ole32
CoInitialize
CoCreateInstance
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoUninitialize
oleaut32
VarUI4FromStr
shlwapi
PathIsDirectoryA
comctl32
InitCommonControlsEx
wininet
HttpQueryInfoA
InternetOpenUrlA
InternetOpenA
InternetGetConnectedState
InternetCloseHandle
InternetReadFile
dbghelp
MakeSureDirectoryPathExists
psapi
GetProcessImageFileNameW
Sections
.text Size: 122KB - Virtual size: 122KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ